共 30 条
[1]
Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
[2]
[Anonymous], 2015, INDIAN J SCI TECHNOL
[3]
Auxilia M., 2016, INDIAN J SCI TECHNOL, V9, P1, DOI DOI 10.17485/ijst/2016/v9i23/95148
[4]
Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption
[J].
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016,
2016, 89
:43-50
[5]
Choi C., 2012, J Internet Serv Inf Secur, V2, P54
[8]
One secure data integrity verification scheme for cloud storage
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2019, 96
:376-385
[10]
Ghosh S, 2018, APPL SCI, V8, P11